Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449640
Rohit M. Thanki, K. Borisagar
Nowadays, two or more than two biometric traits or templates are used for individual verification by many institutions due to limitations of the unimodal biometric system. Two or more than two biometric templates are used for recognition by individuals in biometric system which is known as multibiometric system. The problem of generation of multibiometric template is associated with any multibiometric system designing. In this paper, fusion technique for generation of multibiometric template is proposed using compressive sensing theory and Discrete Wavelet Transform. In this technique, sparse measurements of fingerprint image are fused into diagonal wavelet coefficients of face image of the same individual to generate multibiometric template. The fused face image is used for individual recognition for decisions about verification. Defused sparse measurements of fingerprint image from fused face image and then reconstructed fingerprint image using CS recovery processes from extracted sparse measurements. This reconstructed fingerprint image is used for the second level of verification of individuals. This verification accuracy of face system fingerprint system and multibiometric system is above 80 % after application of the proposed fusion algorithm.
{"title":"Multibiometric template generation using CS theory and discrete wavelet transform based fusion technique","authors":"Rohit M. Thanki, K. Borisagar","doi":"10.1109/NUICONE.2015.7449640","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449640","url":null,"abstract":"Nowadays, two or more than two biometric traits or templates are used for individual verification by many institutions due to limitations of the unimodal biometric system. Two or more than two biometric templates are used for recognition by individuals in biometric system which is known as multibiometric system. The problem of generation of multibiometric template is associated with any multibiometric system designing. In this paper, fusion technique for generation of multibiometric template is proposed using compressive sensing theory and Discrete Wavelet Transform. In this technique, sparse measurements of fingerprint image are fused into diagonal wavelet coefficients of face image of the same individual to generate multibiometric template. The fused face image is used for individual recognition for decisions about verification. Defused sparse measurements of fingerprint image from fused face image and then reconstructed fingerprint image using CS recovery processes from extracted sparse measurements. This reconstructed fingerprint image is used for the second level of verification of individuals. This verification accuracy of face system fingerprint system and multibiometric system is above 80 % after application of the proposed fusion algorithm.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Word Sense Disambiguation (WSD) is crucial and its significance is prominent in every application of computational linguistics. WSD is a challenging problem of Natural Language Processing (NLP). Though there are lots of algorithms for WSD available, still little work is carried out for choosing optimal algorithm for that. Three approaches are available for WSD, namely, Knowledge-based approach, Supervised approach and Unsupervised approach. Also, one can use the combination of given approaches. Supervised approach needs large amounts of manually created sense-annotated corpus which takes computationally more amount of time and effort. Knowledge-based approach requires machine readable dictionaries, sense inventories, thesauri, etc, which are dependent on own interpretation about word's sense; Whereas unsupervised approach uses sense-unannotated corpus and it is based on the phenomenon of working that words that co-occur have similarity. This research is for Hindi language which uses Hierarchical clustering algorithm with different similarity measures which are cosine, Jaccard and dice, the result of clusters is overlapped with Hindi WordNet a product of IIT Bombay which improves result of word sense disambiguation as clustering does grouping of words which are similar.
{"title":"Hierarchical clustering technique for word sense disambiguation using Hindi WordNet","authors":"Nirali Patel, Bhargesh Patel, Rajvi Parikh, Brijesh Bhatt","doi":"10.1109/NUICONE.2015.7449621","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449621","url":null,"abstract":"Word Sense Disambiguation (WSD) is crucial and its significance is prominent in every application of computational linguistics. WSD is a challenging problem of Natural Language Processing (NLP). Though there are lots of algorithms for WSD available, still little work is carried out for choosing optimal algorithm for that. Three approaches are available for WSD, namely, Knowledge-based approach, Supervised approach and Unsupervised approach. Also, one can use the combination of given approaches. Supervised approach needs large amounts of manually created sense-annotated corpus which takes computationally more amount of time and effort. Knowledge-based approach requires machine readable dictionaries, sense inventories, thesauri, etc, which are dependent on own interpretation about word's sense; Whereas unsupervised approach uses sense-unannotated corpus and it is based on the phenomenon of working that words that co-occur have similarity. This research is for Hindi language which uses Hierarchical clustering algorithm with different similarity measures which are cosine, Jaccard and dice, the result of clusters is overlapped with Hindi WordNet a product of IIT Bombay which improves result of word sense disambiguation as clustering does grouping of words which are similar.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449596
Vishal Gupta, V. Gupta, S. Khandelwal, B. Raj, R. Gupta
The power consumption of high performance integrated circuits has increased significantly with technology scaling. Higher power consumption shortens the battery lifetime of portable devices. Furthermore, the increased power consumption poses limitation on the continued technology scaling due to the associated higher power density. In this paper, the sources of power consumption are identified and modeled. Implementation of various techniques and the proposed technique for reducing total leakage current for low power SRAM cell is presented. It is observed in the paper that the total leakage current and power dissipation of the proposed technique is minimized to 52.89 fA and 4.75 nW respectively. Simulations have been performed on Cadence virtuoso 45 nm technologies.
{"title":"Leakage current reduction in finfet based 6T SRAM cell for minimizing power dissipation in nanoscale memories","authors":"Vishal Gupta, V. Gupta, S. Khandelwal, B. Raj, R. Gupta","doi":"10.1109/NUICONE.2015.7449596","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449596","url":null,"abstract":"The power consumption of high performance integrated circuits has increased significantly with technology scaling. Higher power consumption shortens the battery lifetime of portable devices. Furthermore, the increased power consumption poses limitation on the continued technology scaling due to the associated higher power density. In this paper, the sources of power consumption are identified and modeled. Implementation of various techniques and the proposed technique for reducing total leakage current for low power SRAM cell is presented. It is observed in the paper that the total leakage current and power dissipation of the proposed technique is minimized to 52.89 fA and 4.75 nW respectively. Simulations have been performed on Cadence virtuoso 45 nm technologies.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449591
A. Raj
The Inspection of the closed environment may be relevant for improving security and efficiency in industrial plants, These specific operation as inspection, maintenance, cleaning etc. are expensive, thus the application of the robots appears to be one of the most attractive solutions. Recently, in industry duct and ventilation becomes old and many inspection robots were developed in the past. Wired robots put to practical use, but they required heavy power supply. Therefore, a new inspection robot using a wireless communication system is considered useful for inspection of complex and long distance closed environment. A lot of trouble caused by air duct and ventilation like crack, leak and mechanical damage. This Paper describes the development and implementation of inspection robot mounted with an intelligent sensor. In a closed environment, human cannot enter for inspection. So, the main goal was to develop a small inspection robot which can autonomously navigation inside closed environment and measure defect like cracks, leak, mechanical damage and places of the defects inside closed environment. It provides useful information through wireless Zigbee for maintenance. At user end another Zigbee has been received these information and use this information for displayed on GUI.
{"title":"Development of an intelligent sensor based inspection robot for closed environment","authors":"A. Raj","doi":"10.1109/NUICONE.2015.7449591","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449591","url":null,"abstract":"The Inspection of the closed environment may be relevant for improving security and efficiency in industrial plants, These specific operation as inspection, maintenance, cleaning etc. are expensive, thus the application of the robots appears to be one of the most attractive solutions. Recently, in industry duct and ventilation becomes old and many inspection robots were developed in the past. Wired robots put to practical use, but they required heavy power supply. Therefore, a new inspection robot using a wireless communication system is considered useful for inspection of complex and long distance closed environment. A lot of trouble caused by air duct and ventilation like crack, leak and mechanical damage. This Paper describes the development and implementation of inspection robot mounted with an intelligent sensor. In a closed environment, human cannot enter for inspection. So, the main goal was to develop a small inspection robot which can autonomously navigation inside closed environment and measure defect like cracks, leak, mechanical damage and places of the defects inside closed environment. It provides useful information through wireless Zigbee for maintenance. At user end another Zigbee has been received these information and use this information for displayed on GUI.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449609
Sunny Bhadlawala, Kajal Chachapara
Data Growth and Data complexity will increase day by day. Present day needs of data will require unstructured and more access will lead to more data backup, audit, security concerns and need of preparing reduplication. Term cloud computing has opened entire new domain of computability, reliability and efficiency for organizations in term of private cloud computing. It can now focus on providing targeted services and overcome challenges to consumers rather than considering infrastructure and resource issues. Nowadays, sharing secure data to another person without authentication and authorization it with can be more and more difficult for the off-premise cloud which leads to some key points like the security of cloud data should be considered, sharing of cloud data as per requirement should be done. This research paper is based on providing some mechanism to allow secure file sharing for off-premise cloud computing among various cloud users. This paper proposes a framework that can be followed easily to share the file using roll management concept which residing on the cloud with another cloud user. In this framework, a concept of cryptography has been used to generate the secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper proposes the secure mechanism of generating key, sharing a key and validating use of the key for given file.
{"title":"Proposed two layer cryptography key generation for off-premise cloud computing","authors":"Sunny Bhadlawala, Kajal Chachapara","doi":"10.1109/NUICONE.2015.7449609","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449609","url":null,"abstract":"Data Growth and Data complexity will increase day by day. Present day needs of data will require unstructured and more access will lead to more data backup, audit, security concerns and need of preparing reduplication. Term cloud computing has opened entire new domain of computability, reliability and efficiency for organizations in term of private cloud computing. It can now focus on providing targeted services and overcome challenges to consumers rather than considering infrastructure and resource issues. Nowadays, sharing secure data to another person without authentication and authorization it with can be more and more difficult for the off-premise cloud which leads to some key points like the security of cloud data should be considered, sharing of cloud data as per requirement should be done. This research paper is based on providing some mechanism to allow secure file sharing for off-premise cloud computing among various cloud users. This paper proposes a framework that can be followed easily to share the file using roll management concept which residing on the cloud with another cloud user. In this framework, a concept of cryptography has been used to generate the secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper proposes the secure mechanism of generating key, sharing a key and validating use of the key for given file.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449608
Richa Mishra, K. Kotecha
One of the paradox about humans thinking is that they are not simply the only "logical" animal, they are also the only "illogical" animal among all. They are the only animal that uses meanings - ideas, concepts, analogies, metaphors, models, theories, and explanations - to make sense of things, to understand, predict, and control things. They are also the only animal that uses meanings to negate, contradict, and deceive itself, to misconceive, distort, and stereotype, to become dogmatic, prejudiced and narrow-minded. Humans are the only animal whose thinking can be characterized in terms like clear, precise, accurate, relevant, consistent, profound, and fair; they are also the only animal whose thinking is often imprecise, vague, inaccurate, irrelevant, superficial, trivial, and biased. Critical thinking makes sense in light of this paradoxical dichotomy. Humans shouldn't simply trust their instincts. They shouldn't unquestioningly believe what spontaneously occurs to them. They shouldn't accept as true everything taught as true. They shouldn't assume their experience is unbiased. They need to form, they are not born with, intellectually sound standards for belief, for truth, for validity. They need to cultivate habits and traits which integrate these standards into their lives. It is s possible to achieve this by learning traits of Critical Thinking. Critical thinking is trainable skill. This paper is case-study of the endeavor to teach these skills-deductively to Ist year Engineering students. The multi-disciplinary and radical approach in terms of content and methodology has created inquisitive students with mind more open and thinking more precisely. The papers also show case the evidence of tthat this methodology is successful in inculcating the skill and ability to think critically.
{"title":"Thinkers in my classrooms: Teaching critical thinking deductively","authors":"Richa Mishra, K. Kotecha","doi":"10.1109/NUICONE.2015.7449608","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449608","url":null,"abstract":"One of the paradox about humans thinking is that they are not simply the only \"logical\" animal, they are also the only \"illogical\" animal among all. They are the only animal that uses meanings - ideas, concepts, analogies, metaphors, models, theories, and explanations - to make sense of things, to understand, predict, and control things. They are also the only animal that uses meanings to negate, contradict, and deceive itself, to misconceive, distort, and stereotype, to become dogmatic, prejudiced and narrow-minded. Humans are the only animal whose thinking can be characterized in terms like clear, precise, accurate, relevant, consistent, profound, and fair; they are also the only animal whose thinking is often imprecise, vague, inaccurate, irrelevant, superficial, trivial, and biased. Critical thinking makes sense in light of this paradoxical dichotomy. Humans shouldn't simply trust their instincts. They shouldn't unquestioningly believe what spontaneously occurs to them. They shouldn't accept as true everything taught as true. They shouldn't assume their experience is unbiased. They need to form, they are not born with, intellectually sound standards for belief, for truth, for validity. They need to cultivate habits and traits which integrate these standards into their lives. It is s possible to achieve this by learning traits of Critical Thinking. Critical thinking is trainable skill. This paper is case-study of the endeavor to teach these skills-deductively to Ist year Engineering students. The multi-disciplinary and radical approach in terms of content and methodology has created inquisitive students with mind more open and thinking more precisely. The papers also show case the evidence of tthat this methodology is successful in inculcating the skill and ability to think critically.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449610
Hardik K. Molia
TCP - Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios collision is one of the most critical link layer issues which affects overall performance. Inter flow collision occurs among more than one independent TCP connections while Intra flow collision occurs inside a single TCP connection between data flow and ACK flow. ACK Thinning is a process of reducing the rate of ACKs to spare more communication space - bandwidth for the Data flow inside a single TCP connection. This paper introduces an enhanced ACK Thinning scheme SADA - Sender Assisted Delayed Acknowledgement for MANETs. The scheme has been implemented in NS 2.35.
{"title":"TCP with sender assisted delayed acknowledgement — A novel ACK thinning scheme","authors":"Hardik K. Molia","doi":"10.1109/NUICONE.2015.7449610","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449610","url":null,"abstract":"TCP - Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios collision is one of the most critical link layer issues which affects overall performance. Inter flow collision occurs among more than one independent TCP connections while Intra flow collision occurs inside a single TCP connection between data flow and ACK flow. ACK Thinning is a process of reducing the rate of ACKs to spare more communication space - bandwidth for the Data flow inside a single TCP connection. This paper introduces an enhanced ACK Thinning scheme SADA - Sender Assisted Delayed Acknowledgement for MANETs. The scheme has been implemented in NS 2.35.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449607
Sandip A. Mehta, Khushuben Vasoya, D. Adhyaru
In this paper, design and implementation of Neuro-Fuzzy Algorithm for Fractional Order Controller System has been carried out. Fractional order system and controller has wide application in control word. Simulation study for the fractional order transfer function using different control algorithm has been done. Fractional order system was controlled by ANFIS and Classical PID controller. Comparative analysis between ANFIS and PID has been carried out in this paper. From this analysis it is observed that ANFIS gives better performance.
{"title":"ANFIS as a controller for fractional order system","authors":"Sandip A. Mehta, Khushuben Vasoya, D. Adhyaru","doi":"10.1109/NUICONE.2015.7449607","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449607","url":null,"abstract":"In this paper, design and implementation of Neuro-Fuzzy Algorithm for Fractional Order Controller System has been carried out. Fractional order system and controller has wide application in control word. Simulation study for the fractional order transfer function using different control algorithm has been done. Fractional order system was controlled by ANFIS and Classical PID controller. Comparative analysis between ANFIS and PID has been carried out in this paper. From this analysis it is observed that ANFIS gives better performance.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115115886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449594
S. Kamdar, Harsidh Brahmbhatt, Tigmanshu Patel, M. Thakker
The paper describes an accurate method for speed control medium torque (92.17 mN·m), high speed (9778 RPM) Brushed DC motor without using a physical speed sensor. The back EMF is a representative value for the rotational speed of the motor which has been further used for correlation with speed. Several experiments have been carried out to relate back EMF with speed of the motor rotating a fixed load, no load and variable load. The speed so calculated will generate the error data after comparison with set point. The error is corrected by a discrete PID controller with sampling time of 50 ms, developed in an embedded system. A model of DC motor is identified and validated to determine optimum P, I, D constants and transfer function for accurate speed control. The closed loop system gives an accurate control of DC motor with settling time of 2.45 seconds, peak overshoot of less than 5% and accuracy of speed control less than +/- 1% of full scale.
{"title":"Sensorless speed control of high speed brushed DC motor by model identification and validation","authors":"S. Kamdar, Harsidh Brahmbhatt, Tigmanshu Patel, M. Thakker","doi":"10.1109/NUICONE.2015.7449594","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449594","url":null,"abstract":"The paper describes an accurate method for speed control medium torque (92.17 mN·m), high speed (9778 RPM) Brushed DC motor without using a physical speed sensor. The back EMF is a representative value for the rotational speed of the motor which has been further used for correlation with speed. Several experiments have been carried out to relate back EMF with speed of the motor rotating a fixed load, no load and variable load. The speed so calculated will generate the error data after comparison with set point. The error is corrected by a discrete PID controller with sampling time of 50 ms, developed in an embedded system. A model of DC motor is identified and validated to determine optimum P, I, D constants and transfer function for accurate speed control. The closed loop system gives an accurate control of DC motor with settling time of 2.45 seconds, peak overshoot of less than 5% and accuracy of speed control less than +/- 1% of full scale.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/NUICONE.2015.7449595
Colin David Karat, K. S. Krishna
The application of sensor networks varies from medical field to the military application. The raw data onto the sensor node is of large quantity and it is necessary to store these data bits. In this paper, design of optimized Static Random Access Memory (SRAM) array for the sensor application is implemented. SRAM cell is designed using 8T. The Half Select Condition Free Cross Point 8T SRAM is modified, using transmission gates as access transistors. By simulation, it is observed that the write-ability is enhanced and reduction in the power dissipation. Apart from the memory cell, the SRAM array has been constructed using the optimized peripheral circuits. Simulations show that reading and writing of data takes place correctly.
{"title":"Design of SRAM array using 8T cell for low power sensor network","authors":"Colin David Karat, K. S. Krishna","doi":"10.1109/NUICONE.2015.7449595","DOIUrl":"https://doi.org/10.1109/NUICONE.2015.7449595","url":null,"abstract":"The application of sensor networks varies from medical field to the military application. The raw data onto the sensor node is of large quantity and it is necessary to store these data bits. In this paper, design of optimized Static Random Access Memory (SRAM) array for the sensor application is implemented. SRAM cell is designed using 8T. The Half Select Condition Free Cross Point 8T SRAM is modified, using transmission gates as access transistors. By simulation, it is observed that the write-ability is enhanced and reduction in the power dissipation. Apart from the memory cell, the SRAM array has been constructed using the optimized peripheral circuits. Simulations show that reading and writing of data takes place correctly.","PeriodicalId":131332,"journal":{"name":"2015 5th Nirma University International Conference on Engineering (NUiCONE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126777076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}